Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 16:41 UTC

General

  • Target

    9d9d32c6ff763b4364b4edc33ec59590N.exe

  • Size

    84KB

  • MD5

    9d9d32c6ff763b4364b4edc33ec59590

  • SHA1

    649b9f1f41200de4032a4d311cf61d8e587061e7

  • SHA256

    42d0d9712e9ef0c9f058a00e5e649f02562bbe412d2c76c1fcde864b25748148

  • SHA512

    f504a887149de885b2b8bc4e36605d24048452feae8f7163b9c818fb3b895d721aa1cc93650ad7337f7da0199330266cfcd7e66813fb58828e715551e65cec0a

  • SSDEEP

    1536:37DBfi2c1uJCsxg6TAmSXyW4P2dP++hdc5t6FTtCmMA+ttUHxeW6Q:37DBfi2nJjGQ1LqdPXo4BtCkoUHxX6Q

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d9d32c6ff763b4364b4edc33ec59590N.exe
    "C:\Users\Admin\AppData\Local\Temp\9d9d32c6ff763b4364b4edc33ec59590N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\9d9d32c6ff763b4364b4edc33ec59590N.exe
      2⤵
        PID:2488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 192
        2⤵
        • Program crash
        PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2084-3-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.